h1. Bootloaders |_. Device and documentation |_. Freedom situation |_. Boot order | | [[NexusSI902xBootloader| Samsung Nexus S (i902x)]] | Proprietary, Signed on the tested devices | ?->USB->?->eMMC->? | | [[I9100Bootloader| Samsung Galaxy S2 (i9100)]] | Proprietary, probably Signed | ? | | [[GalaxyTab2Bootloader| Samsung Galaxy Tab 2]] | Proprietary, signed | ?->USB->?->eMMC->? | | [[OptimusBlackBootloader| LG Optimus black (p970)]] | unsigned, can be replaced with upstream u-boot | eMMC(MMC2)->USB | | [[Exynos4Bootrom|Galaxy SIII (I9300) Galaxy SIII 4G (I9305) Galaxy Note II (N7100) Galaxy Note II 4G (N7105)]] | * Proprietary, Signed * There is work in progress to understand if we can avoid the signature | ?->eMMC->?->USB->? | | Golden Delicous GTA04 | unsigned, free software | * Aux not pressed during boot: ? * Aux pressed during boot: ?->SD->?->NAND SYS_BOOT0 = 1 SYS_BOOT1 = 1 SYS_BOOT2 = 1 SYS_BOOT3 = 1 SYS_BOOT4 = 1 SYS_BOOT5 = AUX button SYS_BOOT6 = 1 But cannot find Reference manual for the DM370 | |_. SOC and documentation |_. Freedom situation | | [[Exynos4Bootrom|Exynos 4412]] | Some or all devices are signed | | h2. Other attempts that involves bypassing the bootrom There have been several security issues in bootrom, which can enable to run fully free software bootloaders, that are under the user control, even on devices that are configured to enforce bootloader signatures. The most interesting security issues is when it enables to just replace the nonfree bootloader by a free bootloader that is controlled by the user. While being able to load a free bootloader through USB is nice, it's not enough per se as it has usability concerns: it's not convenient to need another computer each time you need to power on your smartphone or tablet. It seems that according to a "youtube video":https://www.youtube.com/watch?v=REx_qSTulJM small enough USB dongles exist that implemented fusee_gelee for the Nitendo Switch. On tegras, as the bootrom can also be patched as part of it ends up being in the fuse memory region, it may be possible to patch the bootrom to bypass the code signature and not need such dongles. |_. Affected SOCs |_. Type |_. Link | | Tegra | USB boot | "fusee_gelee":https://github.com/Qyriad/fusee-launcher/blob/master/report/fusee_gelee.md | | IMX 5 and 6 | Normal boot, and maybe USB boot too | "Ref_QBVR2017-0001.txt":https://github.com/f-secure-foundry/usbarmory/blob/master/software/secure_boot/Security_Advisory-Ref_QBVR2017-0001.txt | Other links to cathegorize: * http://www.droid-developers.org : This attempts to run user code on several Motorolla smartphones. It includes analysis of the boot chain: ** "Application_Processor_Boot_ROM":www.droid-developers.org/wiki/Application_Processor_Boot_ROM ** "Booting_chain":http://www.droid-developers.org/wiki/Booting_chain * https://www.theiphonewiki.com/ has a list of "Bootrom security issues":https://www.theiphonewiki.com/wiki/Bootrom for apple devices. * "Ti Nspire":https://hackspire.org ? RSA exponent issues? == See also == * [[Upstream]]